Product

Strengthening Integrations in the Abstract Security Platform

Written by: 
Aqsa Taylor
Published on: 
Jan 14, 2025
On This Page
Share:
Try abstract today!
Abstract AI Gen. Composable platform diagram showing data sources, security data pipelines, detection fabric, data lakes, and AI SOC components including Hunt, SIEM Console, and Response & SOAR.

Get Abstracted!

Going into 2025, Abstract Security continues to provide best-in-class technology to our customers and build upon our award-winning platform to eliminate the unneeded complexity involving data operations, all while enhancing threat insights. Here’s what you need to know about the latest integrations our teams have made available!

Integration Station, Your Destination for Seamless Connections

We recognize that one cloud service provider, or one data-logging platform is enough for every organization. With that in mind, our teams at Abstract are always at work enhancing our growing list of integrations!

Abstract Security's platform enables enrichment, filtering, aggregation as well as analysis, and detection and now supports the following data sources:  

  • CloudFlare via Webhook and Cloud Storage buckets
  • Jumpcloud Events
  • AWS WAF Logs
  • GitLab on-prem
  • OnFIDO via Syslog
  • Squid Proxy via Syslog
  • Cisco ASA via Syslog
  • Auth0 via WebHook

Travel to More Data Destinations!

With growing compliance and data regulatory needs, it’s essential to unify security data operations within a central platform. Abstract has added support for the following data destinations:

Additionally, we’ve enhanced the following data sources already available within the Abstract Security Platform!

  • Microsoft Graph API
  • SentinelOne API Integration
  • Microsoft 365
  • Intel471 Intelligence API
  • Windows Event Logs
  • Proofpoint

Additional Pipelines Content  

We’ve enhanced the following data integrations with additional pipelines content to filter, aggregate, transform, and enrich. CloudFlare users can reduce data by atleast 40% (with just OOTB rules), and we’ve added new networking pipeline rules to aggregate and filter data. Microsoft Azure and Entra ID enrichment users can now easily map Application names to AppID GUIDs.

Better Threat Insights with ASTRO (Abstract Security Threat and Research Org)

Here’s the latest enhancements and product updates we’re making to our platform via ASTRO:

  • Phish Detection: Improve security via improved Lure keywords.
  • SentinelOne: New detection rules have been added to help aggregate and automate detection alerts.
  • GitHub: Added detection rules for suspicious branch and repo creation, transfer, and modification activities.

Don’t miss out on future updates. Subscribe to Abstract Security’s newsletter to stay up-to-date on our most exciting announcements. Also, follow us on LinkedIn and subscribe to our Youtube channel!

GET
ABSTRACTED

We would love you to be a part of the journey, lets grab a coffee, have a chat, and set up a demo!

Your friends at Abstract AKA one of the most fun teams in cyber ;)

White light beam passing through a black circle with a pink abstract symbol, dispersing into multicolored beams on the right.
Thank you!
Your submission has been received.
Oops! Something went wrong while submitting the form.